blob: a20320c666fd669582066c1bca0a0b1e51f00e0b [file] [log] [blame]
Paul Menageddbcc7e2007-10-18 23:39:30 -07001#ifndef _LINUX_CGROUP_H
2#define _LINUX_CGROUP_H
3/*
4 * cgroup interface
5 *
6 * Copyright (C) 2003 BULL SA
7 * Copyright (C) 2004-2006 Silicon Graphics, Inc.
8 *
9 */
10
11#include <linux/sched.h>
Paul Menageddbcc7e2007-10-18 23:39:30 -070012#include <linux/cpumask.h>
13#include <linux/nodemask.h>
Tejun Heoeb6fd502012-11-09 09:12:29 -080014#include <linux/rculist.h>
Balbir Singh846c7bb2007-10-18 23:39:44 -070015#include <linux/cgroupstats.h>
Tejun Heo25a7e682013-04-14 20:15:25 -070016#include <linux/fs.h>
Tejun Heo7da11272013-12-05 12:28:04 -050017#include <linux/seq_file.h>
Tejun Heo2bd59d42014-02-11 11:52:49 -050018#include <linux/kernfs.h>
Tejun Heo49d1dc42015-09-18 11:56:28 -040019#include <linux/jump_label.h>
Aditya Kalia79a9082016-01-29 02:54:06 -060020#include <linux/nsproxy.h>
21#include <linux/types.h>
22#include <linux/ns_common.h>
23#include <linux/nsproxy.h>
24#include <linux/user_namespace.h>
Tejun Heob4a04ab2015-05-13 15:38:40 -040025
26#include <linux/cgroup-defs.h>
Paul Menageddbcc7e2007-10-18 23:39:30 -070027
28#ifdef CONFIG_CGROUPS
29
Tejun Heo6abc8ca2015-08-04 15:20:55 -040030/*
31 * All weight knobs on the default hierarhcy should use the following min,
32 * default and max values. The default value is the logarithmic center of
33 * MIN and MAX and allows 100x to be expressed in both directions.
34 */
35#define CGROUP_WEIGHT_MIN 1
36#define CGROUP_WEIGHT_DFL 100
37#define CGROUP_WEIGHT_MAX 10000
38
Tejun Heoc326aa22015-05-13 16:24:16 -040039/* a css_task_iter should be treated as an opaque object */
40struct css_task_iter {
41 struct cgroup_subsys *ss;
Paul Menageddbcc7e2007-10-18 23:39:30 -070042
Tejun Heoc326aa22015-05-13 16:24:16 -040043 struct list_head *cset_pos;
44 struct list_head *cset_head;
Paul Menageddbcc7e2007-10-18 23:39:30 -070045
Tejun Heoc326aa22015-05-13 16:24:16 -040046 struct list_head *task_pos;
47 struct list_head *tasks_head;
48 struct list_head *mg_tasks_head;
Tejun Heoed27b9f2015-10-15 16:41:52 -040049
50 struct css_set *cur_cset;
51 struct task_struct *cur_task;
52 struct list_head iters_node; /* css_set->task_iters */
Paul Menage817929e2007-10-18 23:39:36 -070053};
Tejun Heoc326aa22015-05-13 16:24:16 -040054
55extern struct cgroup_root cgrp_dfl_root;
56extern struct css_set init_css_set;
57
58#define SUBSYS(_x) extern struct cgroup_subsys _x ## _cgrp_subsys;
59#include <linux/cgroup_subsys.h>
Paul Menage817929e2007-10-18 23:39:36 -070060#undef SUBSYS
61
Tejun Heo49d1dc42015-09-18 11:56:28 -040062#define SUBSYS(_x) \
63 extern struct static_key_true _x ## _cgrp_subsys_enabled_key; \
64 extern struct static_key_true _x ## _cgrp_subsys_on_dfl_key;
65#include <linux/cgroup_subsys.h>
66#undef SUBSYS
67
68/**
69 * cgroup_subsys_enabled - fast test on whether a subsys is enabled
70 * @ss: subsystem in question
71 */
72#define cgroup_subsys_enabled(ss) \
73 static_branch_likely(&ss ## _enabled_key)
74
75/**
76 * cgroup_subsys_on_dfl - fast test on whether a subsys is on default hierarchy
77 * @ss: subsystem in question
78 */
79#define cgroup_subsys_on_dfl(ss) \
80 static_branch_likely(&ss ## _on_dfl_key)
81
Tejun Heoc326aa22015-05-13 16:24:16 -040082bool css_has_online_children(struct cgroup_subsys_state *css);
83struct cgroup_subsys_state *css_from_id(int id, struct cgroup_subsys *ss);
84struct cgroup_subsys_state *cgroup_get_e_css(struct cgroup *cgroup,
85 struct cgroup_subsys *ss);
86struct cgroup_subsys_state *css_tryget_online_from_dir(struct dentry *dentry,
87 struct cgroup_subsys *ss);
88
Tejun Heo16af4392015-11-20 15:55:52 -050089struct cgroup *cgroup_get_from_path(const char *path);
90
Tejun Heoc326aa22015-05-13 16:24:16 -040091int cgroup_attach_task_all(struct task_struct *from, struct task_struct *);
92int cgroup_transfer_tasks(struct cgroup *to, struct cgroup *from);
93
94int cgroup_add_dfl_cftypes(struct cgroup_subsys *ss, struct cftype *cfts);
95int cgroup_add_legacy_cftypes(struct cgroup_subsys *ss, struct cftype *cfts);
96int cgroup_rm_cftypes(struct cftype *cfts);
Tejun Heo34c06252015-11-05 00:12:24 -050097void cgroup_file_notify(struct cgroup_file *cfile);
Tejun Heoc326aa22015-05-13 16:24:16 -040098
99char *task_cgroup_path(struct task_struct *task, char *buf, size_t buflen);
100int cgroupstats_build(struct cgroupstats *stats, struct dentry *dentry);
101int proc_cgroup_show(struct seq_file *m, struct pid_namespace *ns,
102 struct pid *pid, struct task_struct *tsk);
103
104void cgroup_fork(struct task_struct *p);
Oleg Nesterovb53202e2015-12-03 10:24:08 -0500105extern int cgroup_can_fork(struct task_struct *p);
106extern void cgroup_cancel_fork(struct task_struct *p);
107extern void cgroup_post_fork(struct task_struct *p);
Tejun Heoc326aa22015-05-13 16:24:16 -0400108void cgroup_exit(struct task_struct *p);
Tejun Heo2e91fa72015-10-15 16:41:53 -0400109void cgroup_free(struct task_struct *p);
Tejun Heoc326aa22015-05-13 16:24:16 -0400110
111int cgroup_init_early(void);
112int cgroup_init(void);
113
Tejun Heo5c9d5352014-05-16 13:22:48 -0400114/*
Tejun Heoc326aa22015-05-13 16:24:16 -0400115 * Iteration helpers and macros.
Tejun Heo5c9d5352014-05-16 13:22:48 -0400116 */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700117
Tejun Heoc326aa22015-05-13 16:24:16 -0400118struct cgroup_subsys_state *css_next_child(struct cgroup_subsys_state *pos,
119 struct cgroup_subsys_state *parent);
120struct cgroup_subsys_state *css_next_descendant_pre(struct cgroup_subsys_state *pos,
121 struct cgroup_subsys_state *css);
122struct cgroup_subsys_state *css_rightmost_descendant(struct cgroup_subsys_state *pos);
123struct cgroup_subsys_state *css_next_descendant_post(struct cgroup_subsys_state *pos,
124 struct cgroup_subsys_state *css);
Tejun Heo72c97e52013-08-08 20:11:22 -0400125
Tejun Heo1f7dd3e52015-12-03 10:18:21 -0500126struct task_struct *cgroup_taskset_first(struct cgroup_taskset *tset,
127 struct cgroup_subsys_state **dst_cssp);
128struct task_struct *cgroup_taskset_next(struct cgroup_taskset *tset,
129 struct cgroup_subsys_state **dst_cssp);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700130
Tejun Heoc326aa22015-05-13 16:24:16 -0400131void css_task_iter_start(struct cgroup_subsys_state *css,
132 struct css_task_iter *it);
133struct task_struct *css_task_iter_next(struct css_task_iter *it);
134void css_task_iter_end(struct css_task_iter *it);
Tejun Heo0ae78e02013-08-13 11:01:54 -0400135
Tejun Heoc326aa22015-05-13 16:24:16 -0400136/**
137 * css_for_each_child - iterate through children of a css
138 * @pos: the css * to use as the loop cursor
139 * @parent: css whose children to walk
140 *
141 * Walk @parent's children. Must be called under rcu_read_lock().
142 *
143 * If a subsystem synchronizes ->css_online() and the start of iteration, a
144 * css which finished ->css_online() is guaranteed to be visible in the
145 * future iterations and will stay visible until the last reference is put.
146 * A css which hasn't finished ->css_online() or already finished
147 * ->css_offline() may show up during traversal. It's each subsystem's
148 * responsibility to synchronize against on/offlining.
149 *
150 * It is allowed to temporarily drop RCU read lock during iteration. The
151 * caller is responsible for ensuring that @pos remains accessible until
152 * the start of the next iteration by, for example, bumping the css refcnt.
153 */
154#define css_for_each_child(pos, parent) \
155 for ((pos) = css_next_child(NULL, (parent)); (pos); \
156 (pos) = css_next_child((pos), (parent)))
Tejun Heod5c419b2014-05-16 13:22:48 -0400157
Tejun Heoc326aa22015-05-13 16:24:16 -0400158/**
159 * css_for_each_descendant_pre - pre-order walk of a css's descendants
160 * @pos: the css * to use as the loop cursor
161 * @root: css whose descendants to walk
162 *
163 * Walk @root's descendants. @root is included in the iteration and the
164 * first node to be visited. Must be called under rcu_read_lock().
165 *
166 * If a subsystem synchronizes ->css_online() and the start of iteration, a
167 * css which finished ->css_online() is guaranteed to be visible in the
168 * future iterations and will stay visible until the last reference is put.
169 * A css which hasn't finished ->css_online() or already finished
170 * ->css_offline() may show up during traversal. It's each subsystem's
171 * responsibility to synchronize against on/offlining.
172 *
173 * For example, the following guarantees that a descendant can't escape
174 * state updates of its ancestors.
175 *
176 * my_online(@css)
177 * {
178 * Lock @css's parent and @css;
179 * Inherit state from the parent;
180 * Unlock both.
181 * }
182 *
183 * my_update_state(@css)
184 * {
185 * css_for_each_descendant_pre(@pos, @css) {
186 * Lock @pos;
187 * if (@pos == @css)
188 * Update @css's state;
189 * else
190 * Verify @pos is alive and inherit state from its parent;
191 * Unlock @pos;
192 * }
193 * }
194 *
195 * As long as the inheriting step, including checking the parent state, is
196 * enclosed inside @pos locking, double-locking the parent isn't necessary
197 * while inheriting. The state update to the parent is guaranteed to be
198 * visible by walking order and, as long as inheriting operations to the
199 * same @pos are atomic to each other, multiple updates racing each other
200 * still result in the correct state. It's guaranateed that at least one
201 * inheritance happens for any css after the latest update to its parent.
202 *
203 * If checking parent's state requires locking the parent, each inheriting
204 * iteration should lock and unlock both @pos->parent and @pos.
205 *
206 * Alternatively, a subsystem may choose to use a single global lock to
207 * synchronize ->css_online() and ->css_offline() against tree-walking
208 * operations.
209 *
210 * It is allowed to temporarily drop RCU read lock during iteration. The
211 * caller is responsible for ensuring that @pos remains accessible until
212 * the start of the next iteration by, for example, bumping the css refcnt.
213 */
214#define css_for_each_descendant_pre(pos, css) \
215 for ((pos) = css_next_descendant_pre(NULL, (css)); (pos); \
216 (pos) = css_next_descendant_pre((pos), (css)))
Tejun Heo15a4c832014-05-04 15:09:14 -0400217
Tejun Heoc326aa22015-05-13 16:24:16 -0400218/**
219 * css_for_each_descendant_post - post-order walk of a css's descendants
220 * @pos: the css * to use as the loop cursor
221 * @css: css whose descendants to walk
222 *
223 * Similar to css_for_each_descendant_pre() but performs post-order
224 * traversal instead. @root is included in the iteration and the last
225 * node to be visited.
226 *
227 * If a subsystem synchronizes ->css_online() and the start of iteration, a
228 * css which finished ->css_online() is guaranteed to be visible in the
229 * future iterations and will stay visible until the last reference is put.
230 * A css which hasn't finished ->css_online() or already finished
231 * ->css_offline() may show up during traversal. It's each subsystem's
232 * responsibility to synchronize against on/offlining.
233 *
234 * Note that the walk visibility guarantee example described in pre-order
235 * walk doesn't apply the same to post-order walks.
236 */
237#define css_for_each_descendant_post(pos, css) \
238 for ((pos) = css_next_descendant_post(NULL, (css)); (pos); \
239 (pos) = css_next_descendant_post((pos), (css)))
Tejun Heo48ddbe12012-04-01 12:09:56 -0700240
Tejun Heoc326aa22015-05-13 16:24:16 -0400241/**
242 * cgroup_taskset_for_each - iterate cgroup_taskset
243 * @task: the loop cursor
Tejun Heo1f7dd3e52015-12-03 10:18:21 -0500244 * @dst_css: the destination css
Tejun Heoc326aa22015-05-13 16:24:16 -0400245 * @tset: taskset to iterate
Tejun Heo4530edd2015-09-11 15:00:19 -0400246 *
247 * @tset may contain multiple tasks and they may belong to multiple
Tejun Heo1f7dd3e52015-12-03 10:18:21 -0500248 * processes.
249 *
250 * On the v2 hierarchy, there may be tasks from multiple processes and they
251 * may not share the source or destination csses.
252 *
253 * On traditional hierarchies, when there are multiple tasks in @tset, if a
254 * task of a process is in @tset, all tasks of the process are in @tset.
255 * Also, all are guaranteed to share the same source and destination csses.
Tejun Heo4530edd2015-09-11 15:00:19 -0400256 *
257 * Iteration is not in any specific order.
Tejun Heoc326aa22015-05-13 16:24:16 -0400258 */
Tejun Heo1f7dd3e52015-12-03 10:18:21 -0500259#define cgroup_taskset_for_each(task, dst_css, tset) \
260 for ((task) = cgroup_taskset_first((tset), &(dst_css)); \
261 (task); \
262 (task) = cgroup_taskset_next((tset), &(dst_css)))
Tejun Heo0cb51d72014-05-16 13:22:49 -0400263
Tejun Heo4530edd2015-09-11 15:00:19 -0400264/**
265 * cgroup_taskset_for_each_leader - iterate group leaders in a cgroup_taskset
266 * @leader: the loop cursor
Tejun Heo1f7dd3e52015-12-03 10:18:21 -0500267 * @dst_css: the destination css
Tejun Heo4530edd2015-09-11 15:00:19 -0400268 * @tset: takset to iterate
269 *
270 * Iterate threadgroup leaders of @tset. For single-task migrations, @tset
271 * may not contain any.
272 */
Tejun Heo1f7dd3e52015-12-03 10:18:21 -0500273#define cgroup_taskset_for_each_leader(leader, dst_css, tset) \
274 for ((leader) = cgroup_taskset_first((tset), &(dst_css)); \
275 (leader); \
276 (leader) = cgroup_taskset_next((tset), &(dst_css))) \
Tejun Heo4530edd2015-09-11 15:00:19 -0400277 if ((leader) != (leader)->group_leader) \
278 ; \
279 else
280
Tejun Heoc326aa22015-05-13 16:24:16 -0400281/*
282 * Inline functions.
283 */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700284
Tejun Heo5de01072013-06-12 21:04:52 -0700285/**
286 * css_get - obtain a reference on the specified css
287 * @css: target css
288 *
289 * The caller must already have a reference.
Paul Menageddbcc7e2007-10-18 23:39:30 -0700290 */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700291static inline void css_get(struct cgroup_subsys_state *css)
292{
Tejun Heo3b514d22014-05-16 13:22:47 -0400293 if (!(css->flags & CSS_NO_REF))
294 percpu_ref_get(&css->refcnt);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700295}
Paul Menagee7c5ec92009-01-07 18:08:38 -0800296
Tejun Heo5de01072013-06-12 21:04:52 -0700297/**
Johannes Weinere8ea14c2014-12-10 15:42:42 -0800298 * css_get_many - obtain references on the specified css
299 * @css: target css
300 * @n: number of references to get
301 *
302 * The caller must already have a reference.
303 */
304static inline void css_get_many(struct cgroup_subsys_state *css, unsigned int n)
305{
306 if (!(css->flags & CSS_NO_REF))
307 percpu_ref_get_many(&css->refcnt, n);
308}
309
310/**
Tejun Heo6f4524d2014-05-16 13:22:52 -0400311 * css_tryget - try to obtain a reference on the specified css
312 * @css: target css
313 *
314 * Obtain a reference on @css unless it already has reached zero and is
315 * being released. This function doesn't care whether @css is on or
316 * offline. The caller naturally needs to ensure that @css is accessible
317 * but doesn't have to be holding a reference on it - IOW, RCU protected
318 * access is good enough for this function. Returns %true if a reference
319 * count was successfully obtained; %false otherwise.
320 */
321static inline bool css_tryget(struct cgroup_subsys_state *css)
322{
323 if (!(css->flags & CSS_NO_REF))
324 return percpu_ref_tryget(&css->refcnt);
325 return true;
326}
327
328/**
Tejun Heoec903c02014-05-13 12:11:01 -0400329 * css_tryget_online - try to obtain a reference on the specified css if online
Tejun Heo5de01072013-06-12 21:04:52 -0700330 * @css: target css
331 *
Tejun Heoec903c02014-05-13 12:11:01 -0400332 * Obtain a reference on @css if it's online. The caller naturally needs
333 * to ensure that @css is accessible but doesn't have to be holding a
Tejun Heo5de01072013-06-12 21:04:52 -0700334 * reference on it - IOW, RCU protected access is good enough for this
335 * function. Returns %true if a reference count was successfully obtained;
336 * %false otherwise.
337 */
Tejun Heoec903c02014-05-13 12:11:01 -0400338static inline bool css_tryget_online(struct cgroup_subsys_state *css)
Paul Menagee7c5ec92009-01-07 18:08:38 -0800339{
Tejun Heo3b514d22014-05-16 13:22:47 -0400340 if (!(css->flags & CSS_NO_REF))
341 return percpu_ref_tryget_live(&css->refcnt);
342 return true;
Paul Menagee7c5ec92009-01-07 18:08:38 -0800343}
344
Tejun Heo5de01072013-06-12 21:04:52 -0700345/**
346 * css_put - put a css reference
347 * @css: target css
348 *
Tejun Heoec903c02014-05-13 12:11:01 -0400349 * Put a reference obtained via css_get() and css_tryget_online().
Tejun Heo5de01072013-06-12 21:04:52 -0700350 */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700351static inline void css_put(struct cgroup_subsys_state *css)
352{
Tejun Heo3b514d22014-05-16 13:22:47 -0400353 if (!(css->flags & CSS_NO_REF))
354 percpu_ref_put(&css->refcnt);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700355}
356
Johannes Weinere8ea14c2014-12-10 15:42:42 -0800357/**
358 * css_put_many - put css references
359 * @css: target css
360 * @n: number of references to put
361 *
362 * Put references obtained via css_get() and css_tryget_online().
363 */
364static inline void css_put_many(struct cgroup_subsys_state *css, unsigned int n)
365{
366 if (!(css->flags & CSS_NO_REF))
367 percpu_ref_put_many(&css->refcnt, n);
368}
369
Tejun Heo16af4392015-11-20 15:55:52 -0500370static inline void cgroup_put(struct cgroup *cgrp)
371{
372 css_put(&cgrp->self);
373}
374
Tejun Heoc326aa22015-05-13 16:24:16 -0400375/**
376 * task_css_set_check - obtain a task's css_set with extra access conditions
377 * @task: the task to obtain css_set for
378 * @__c: extra condition expression to be passed to rcu_dereference_check()
Paul Menageddbcc7e2007-10-18 23:39:30 -0700379 *
Tejun Heoc326aa22015-05-13 16:24:16 -0400380 * A task's css_set is RCU protected, initialized and exited while holding
381 * task_lock(), and can only be modified while holding both cgroup_mutex
382 * and task_lock() while the task is alive. This macro verifies that the
383 * caller is inside proper critical section and returns @task's css_set.
384 *
385 * The caller can also specify additional allowed conditions via @__c, such
386 * as locks used during the cgroup_subsys::attach() methods.
Paul Menageddbcc7e2007-10-18 23:39:30 -0700387 */
Tejun Heoc326aa22015-05-13 16:24:16 -0400388#ifdef CONFIG_PROVE_RCU
389extern struct mutex cgroup_mutex;
Tejun Heof0d9a5f2015-10-15 16:41:53 -0400390extern spinlock_t css_set_lock;
Tejun Heoc326aa22015-05-13 16:24:16 -0400391#define task_css_set_check(task, __c) \
392 rcu_dereference_check((task)->cgroups, \
393 lockdep_is_held(&cgroup_mutex) || \
Tejun Heof0d9a5f2015-10-15 16:41:53 -0400394 lockdep_is_held(&css_set_lock) || \
Tejun Heoc326aa22015-05-13 16:24:16 -0400395 ((task)->flags & PF_EXITING) || (__c))
396#else
397#define task_css_set_check(task, __c) \
398 rcu_dereference((task)->cgroups)
Tejun Heo2bd59d42014-02-11 11:52:49 -0500399#endif
Paul Menageddbcc7e2007-10-18 23:39:30 -0700400
Tejun Heoc326aa22015-05-13 16:24:16 -0400401/**
402 * task_css_check - obtain css for (task, subsys) w/ extra access conds
403 * @task: the target task
404 * @subsys_id: the target subsystem ID
405 * @__c: extra condition expression to be passed to rcu_dereference_check()
406 *
407 * Return the cgroup_subsys_state for the (@task, @subsys_id) pair. The
408 * synchronization rules are the same as task_css_set_check().
409 */
410#define task_css_check(task, subsys_id, __c) \
411 task_css_set_check((task), (__c))->subsys[(subsys_id)]
412
413/**
414 * task_css_set - obtain a task's css_set
415 * @task: the task to obtain css_set for
416 *
417 * See task_css_set_check().
418 */
419static inline struct css_set *task_css_set(struct task_struct *task)
420{
421 return task_css_set_check(task, false);
422}
423
424/**
425 * task_css - obtain css for (task, subsys)
426 * @task: the target task
427 * @subsys_id: the target subsystem ID
428 *
429 * See task_css_check().
430 */
431static inline struct cgroup_subsys_state *task_css(struct task_struct *task,
432 int subsys_id)
433{
434 return task_css_check(task, subsys_id, false);
435}
436
437/**
Linus Torvaldsbbe179f2015-06-26 19:50:04 -0700438 * task_get_css - find and get the css for (task, subsys)
439 * @task: the target task
440 * @subsys_id: the target subsystem ID
441 *
442 * Find the css for the (@task, @subsys_id) combination, increment a
443 * reference on and return it. This function is guaranteed to return a
444 * valid css.
445 */
446static inline struct cgroup_subsys_state *
447task_get_css(struct task_struct *task, int subsys_id)
448{
449 struct cgroup_subsys_state *css;
450
451 rcu_read_lock();
452 while (true) {
453 css = task_css(task, subsys_id);
454 if (likely(css_tryget_online(css)))
455 break;
456 cpu_relax();
457 }
458 rcu_read_unlock();
459 return css;
460}
461
462/**
Tejun Heoc326aa22015-05-13 16:24:16 -0400463 * task_css_is_root - test whether a task belongs to the root css
464 * @task: the target task
465 * @subsys_id: the target subsystem ID
466 *
467 * Test whether @task belongs to the root css on the specified subsystem.
468 * May be invoked in any context.
469 */
470static inline bool task_css_is_root(struct task_struct *task, int subsys_id)
471{
472 return task_css_check(task, subsys_id, true) ==
473 init_css_set.subsys[subsys_id];
474}
475
476static inline struct cgroup *task_cgroup(struct task_struct *task,
477 int subsys_id)
478{
479 return task_css(task, subsys_id)->cgroup;
480}
Tejun Heoa2dd4242014-03-19 10:23:55 -0400481
Tejun Heob11cfb52015-11-20 15:55:52 -0500482/**
483 * cgroup_is_descendant - test ancestry
484 * @cgrp: the cgroup to be tested
485 * @ancestor: possible ancestor of @cgrp
486 *
487 * Test whether @cgrp is a descendant of @ancestor. It also returns %true
488 * if @cgrp == @ancestor. This function is safe to call as long as @cgrp
489 * and @ancestor are accessible.
490 */
491static inline bool cgroup_is_descendant(struct cgroup *cgrp,
492 struct cgroup *ancestor)
493{
494 if (cgrp->root != ancestor->root || cgrp->level < ancestor->level)
495 return false;
496 return cgrp->ancestor_ids[ancestor->level] == ancestor->id;
497}
498
Tejun Heo07bc3562014-02-13 06:58:39 -0500499/* no synchronization, the result can only be used as a hint */
Tejun Heo27bd4db2015-10-15 16:41:50 -0400500static inline bool cgroup_is_populated(struct cgroup *cgrp)
Tejun Heo07bc3562014-02-13 06:58:39 -0500501{
Tejun Heo27bd4db2015-10-15 16:41:50 -0400502 return cgrp->populated_cnt;
Tejun Heo07bc3562014-02-13 06:58:39 -0500503}
504
Zefan Lif29374b2014-09-19 16:29:31 +0800505/* returns ino associated with a cgroup */
Tejun Heob1664922014-02-11 11:52:49 -0500506static inline ino_t cgroup_ino(struct cgroup *cgrp)
507{
Zefan Lif29374b2014-09-19 16:29:31 +0800508 return cgrp->kn->ino;
Tejun Heob1664922014-02-11 11:52:49 -0500509}
510
Tejun Heob4168642014-05-13 12:16:21 -0400511/* cft/css accessors for cftype->write() operation */
512static inline struct cftype *of_cft(struct kernfs_open_file *of)
Tejun Heo7da11272013-12-05 12:28:04 -0500513{
Tejun Heo2bd59d42014-02-11 11:52:49 -0500514 return of->kn->priv;
Tejun Heo7da11272013-12-05 12:28:04 -0500515}
516
Tejun Heob4168642014-05-13 12:16:21 -0400517struct cgroup_subsys_state *of_css(struct kernfs_open_file *of);
518
519/* cft/css accessors for cftype->seq_*() operations */
520static inline struct cftype *seq_cft(struct seq_file *seq)
521{
522 return of_cft(seq->private);
523}
524
525static inline struct cgroup_subsys_state *seq_css(struct seq_file *seq)
526{
527 return of_css(seq->private);
528}
Tejun Heo59f52962014-02-11 11:52:49 -0500529
Tejun Heoe61734c2014-02-12 09:29:50 -0500530/*
531 * Name / path handling functions. All are thin wrappers around the kernfs
532 * counterparts and can be called under any context.
533 */
534
535static inline int cgroup_name(struct cgroup *cgrp, char *buf, size_t buflen)
536{
Tejun Heofdce6bf2014-03-19 10:23:54 -0400537 return kernfs_name(cgrp->kn, buf, buflen);
Tejun Heoe61734c2014-02-12 09:29:50 -0500538}
539
540static inline char * __must_check cgroup_path(struct cgroup *cgrp, char *buf,
541 size_t buflen)
542{
Tejun Heofdce6bf2014-03-19 10:23:54 -0400543 return kernfs_path(cgrp->kn, buf, buflen);
Tejun Heoe61734c2014-02-12 09:29:50 -0500544}
545
546static inline void pr_cont_cgroup_name(struct cgroup *cgrp)
547{
Tejun Heofdce6bf2014-03-19 10:23:54 -0400548 pr_cont_kernfs_name(cgrp->kn);
Tejun Heoe61734c2014-02-12 09:29:50 -0500549}
550
551static inline void pr_cont_cgroup_path(struct cgroup *cgrp)
552{
Tejun Heofdce6bf2014-03-19 10:23:54 -0400553 pr_cont_kernfs_path(cgrp->kn);
Tejun Heoe61734c2014-02-12 09:29:50 -0500554}
555
Paul Menageddbcc7e2007-10-18 23:39:30 -0700556#else /* !CONFIG_CGROUPS */
557
Tejun Heof3ba5382015-01-06 12:02:46 -0500558struct cgroup_subsys_state;
559
Tejun Heoc326aa22015-05-13 16:24:16 -0400560static inline void css_put(struct cgroup_subsys_state *css) {}
561static inline int cgroup_attach_task_all(struct task_struct *from,
562 struct task_struct *t) { return 0; }
563static inline int cgroupstats_build(struct cgroupstats *stats,
564 struct dentry *dentry) { return -EINVAL; }
565
Paul Menageb4f48b62007-10-18 23:39:33 -0700566static inline void cgroup_fork(struct task_struct *p) {}
Oleg Nesterovb53202e2015-12-03 10:24:08 -0500567static inline int cgroup_can_fork(struct task_struct *p) { return 0; }
568static inline void cgroup_cancel_fork(struct task_struct *p) {}
569static inline void cgroup_post_fork(struct task_struct *p) {}
Li Zefan1ec41832014-03-28 15:22:19 +0800570static inline void cgroup_exit(struct task_struct *p) {}
Tejun Heo2e91fa72015-10-15 16:41:53 -0400571static inline void cgroup_free(struct task_struct *p) {}
Paul Menageddbcc7e2007-10-18 23:39:30 -0700572
Tejun Heoc326aa22015-05-13 16:24:16 -0400573static inline int cgroup_init_early(void) { return 0; }
574static inline int cgroup_init(void) { return 0; }
Sridhar Samudralad7926ee2010-05-30 22:24:39 +0200575
Paul Menageddbcc7e2007-10-18 23:39:30 -0700576#endif /* !CONFIG_CGROUPS */
577
Tejun Heobd1060a2015-12-07 17:38:53 -0500578/*
579 * sock->sk_cgrp_data handling. For more info, see sock_cgroup_data
580 * definition in cgroup-defs.h.
581 */
582#ifdef CONFIG_SOCK_CGROUP_DATA
583
584#if defined(CONFIG_CGROUP_NET_PRIO) || defined(CONFIG_CGROUP_NET_CLASSID)
585extern spinlock_t cgroup_sk_update_lock;
586#endif
587
588void cgroup_sk_alloc_disable(void);
589void cgroup_sk_alloc(struct sock_cgroup_data *skcd);
590void cgroup_sk_free(struct sock_cgroup_data *skcd);
591
592static inline struct cgroup *sock_cgroup_ptr(struct sock_cgroup_data *skcd)
593{
594#if defined(CONFIG_CGROUP_NET_PRIO) || defined(CONFIG_CGROUP_NET_CLASSID)
595 unsigned long v;
596
597 /*
598 * @skcd->val is 64bit but the following is safe on 32bit too as we
599 * just need the lower ulong to be written and read atomically.
600 */
601 v = READ_ONCE(skcd->val);
602
603 if (v & 1)
604 return &cgrp_dfl_root.cgrp;
605
606 return (struct cgroup *)(unsigned long)v ?: &cgrp_dfl_root.cgrp;
607#else
608 return (struct cgroup *)(unsigned long)skcd->val;
609#endif
610}
611
612#else /* CONFIG_CGROUP_DATA */
613
614static inline void cgroup_sk_alloc(struct sock_cgroup_data *skcd) {}
615static inline void cgroup_sk_free(struct sock_cgroup_data *skcd) {}
616
617#endif /* CONFIG_CGROUP_DATA */
618
Aditya Kalia79a9082016-01-29 02:54:06 -0600619struct cgroup_namespace {
620 atomic_t count;
621 struct ns_common ns;
622 struct user_namespace *user_ns;
623 struct css_set *root_cset;
624};
625
626extern struct cgroup_namespace init_cgroup_ns;
627
628#ifdef CONFIG_CGROUPS
629
630void free_cgroup_ns(struct cgroup_namespace *ns);
631
632struct cgroup_namespace *copy_cgroup_ns(unsigned long flags,
633 struct user_namespace *user_ns,
634 struct cgroup_namespace *old_ns);
635
636char *cgroup_path_ns(struct cgroup *cgrp, char *buf, size_t buflen,
637 struct cgroup_namespace *ns);
638
639#else /* !CONFIG_CGROUPS */
640
641static inline void free_cgroup_ns(struct cgroup_namespace *ns) { }
642static inline struct cgroup_namespace *
643copy_cgroup_ns(unsigned long flags, struct user_namespace *user_ns,
644 struct cgroup_namespace *old_ns)
645{
646 return old_ns;
647}
648
649#endif /* !CONFIG_CGROUPS */
650
651static inline void get_cgroup_ns(struct cgroup_namespace *ns)
652{
653 if (ns)
654 atomic_inc(&ns->count);
655}
656
657static inline void put_cgroup_ns(struct cgroup_namespace *ns)
658{
659 if (ns && atomic_dec_and_test(&ns->count))
660 free_cgroup_ns(ns);
661}
662
Paul Menageddbcc7e2007-10-18 23:39:30 -0700663#endif /* _LINUX_CGROUP_H */